logo

Report on Virtual Private Network 2022

Review existing literatures on VPN technologies and issues and write a report.

12 Pages2383 Words26 Views
   

Added on  2022-09-16

Report on Virtual Private Network 2022

Review existing literatures on VPN technologies and issues and write a report.

   Added on 2022-09-16

ShareRelated Documents
Running head: REPORT ON VIRTUAL PRIVATE NETWORK
REPORT
ON
VIRTUAL PRIVATE NETWORK
Name of the student
Name of ten university
Author Note:
Report on Virtual Private Network 2022_1
Virtual Private Network1
Table of Contents
Part A:........................................................................................................................................2
Introduction-...........................................................................................................................2
Literature Review-.................................................................................................................2
Part B:.........................................................................................................................................3
Authentication and Access control-.......................................................................................3
Part C:.........................................................................................................................................7
Confidentiality and Integrity process-....................................................................................7
Part D:........................................................................................................................................8
Protection against Replay Attacks-........................................................................................8
Part E:.........................................................................................................................................9
Remote Access-......................................................................................................................9
Conclusion-................................................................................................................................9
Part A:
Introduction-
The aim of this report is to discuss about the existing technologies with
respect to its application area. Followed by this aspect in this report a detail
elaboration will be presented related to the application of VPN in the
Report on Virtual Private Network 2022_2
Virtual Private Network2
organizational structure and how it has affected the security process of the an
organization. Since, the aspect of security control holds a significant impact on
the organizational structure as well as in the organizational services it has in this
report it will effectively elaborate the aspect of authentication controls, access
controls, information Confidentiality, information integrity, aspect of anti-replay
as well as the aspect of remote access to the database server with respect to the
application of virtual private network (VPN). Along with discussing all of the
above mentioned aspect this report will also consist a practical part in which
activities on SSL communication server is mentioned.
Literature Review-
Significance of VPN- Virtual private network (VPN) in an encrypted
connectivity with establishes connection between devices and network via
internet. Followed by this aspect in the organizational structure VPN utilizes the
public network infrastructure in order to establish a connectivity among the
organizational devices with the network server via internet. While considering
the application of VPN it is similar to the private network however, it works as a
WAN in order to connect other devices. Followed by this aspect it has been
observed that there are several encryption protocols by which the VPN
operations are performed. Those encryption protocols includes the Internet
Protocol security (IPSec), Generating Routing Encapsulation (GRE), Point to Point
Tunnelling Protocol (PPTP), Transport Layer Security protocol (TLS), Secure
Socket Layer (SSL) Protocol. In which the IPSec protocol is one of the most
utilized protocol among all of the above mentioned protocols as it provides most
effective as well as secure information transferring process by exchanging
encrypted keys. Along with IPSec, transport layer security (TLS) protocol is also
one of the most effective security protocol which performs by establishing
encrypted connection among the device and network as well as the secure
Socket Layer (SSL) protocol is one of the most effective protocol which performs
similar to the TLS protocol. Followed by this aspect it has been observed that
there is a significant difference present in the operations of IPSec and SSL that
SSL establishes the VPN SSL connection but IPSec establishes point to point
internet connection in order to establish the connectivity among the network and
devices. [1]
While concerning about the IKE process it has been observed that it has a
significant on the secure data transmission. Hence, followed by this topic it has
been identified that Cisco ASA 5500 holds the features to enhance the security of
Report on Virtual Private Network 2022_3
Virtual Private Network3
the network by reducing the chances of phishing, spoofing as well as other
external attacks. Cisco ASA 5500 enables this feature into the network by
applying the anti-spam, anti- phishing as well as incorporating the effective web
filtering process which holds the capability to protect the network server from all
of this mentioned attacks in order to provide effectiveness in the organizational
services as it also disables the unauthorized access. [2]
Along with the above discussion it has been also noticed that there is a
significant importance of virtual private network in the field of organizational
security management in which it enables the organizational network to be more
secure as it offers the anti-spam technology, anti- spoofing technology as well as
anti-phishing technology. Along with that since, the VPN follows the encryption
protocols for data transferring it has been also noticed that by exchanging the
encryption and decryption key VPN enables the organizational network to
become more secure. [3]
Apart from the above mentioned application it has been identified that
there is a significant application of Cisco AnyConnect in the field of network
connectivity. Followed by this aspect it has been noticed that AnyConnect
enables the organizational infrastructures as well as the other network
infrastructures to connect with other mobile devices. However, this is also an
effective as well as secure connectivity process as it verifies each of the devices
before connecting with any network in order to provide effective security to the
network server. [4]
Part B:
Authentication and Access control-
1. Followed by the aspect of network security authentication is one of the major
areas as it allows preventions from the possible external attacks as it has
been observed from several investigation there is significant risk present due
to unauthorized network access. Hence, in the field of data transferring server
authentication is one of most impactful aspect which enable the server to
reduce the external threats as well as the enhance the accuracy of the server.
[5]
SSL & TLS analysis:
Website: www.joysdelights.com.au
Report on Virtual Private Network 2022_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
SSL/TLS VPN Technologies: Significance, Role, Advantages, and Security
|9
|2008
|427

Virtual Private Network (VPN) Report 2022
|14
|2220
|21

REPORT ON VIRTUAL PRIVATE NETWORK
|12
|1820
|59

Assignment | The aim of this report is to analyse and understand the process and features of security of the emerging technologies.
|14
|2762
|18

SSL-TLS VPN Technologies
|7
|1448
|24

Riordan Network Security Recommendations Assignment
|5
|923
|161